Military Technology

Cost growth in the development and fielding of technologically advanced weapon systems has become a major economic burden for many nations and is expected to be an enduring and prevalent problem. RAND research has provided cost analyses and recommendations to help policymakers and military leaders develop improved cost-estimating tools and formulate policies that mitigate cost growth in military technology acquisition practices.

  • Report

    RAND Arroyo Center Annual Report 2014

    This annual report describes RAND Arroyo Center's research activities in FY 2014, highlights areas of research focus, and summarizes noteworthy studies.

    Mar 31, 2015

  • Report

    Acquisition of Space Systems, Volume 7: Past Problems and Future Challenges

    As Department of Defense plans for the next-generation space systems in an increasingly challenging fiscal and security environment, it is important to apply lessons learned from past space acquisition, which had experienced many difficulties.

    Mar 30, 2015

  • Gears

    Project

    Using Innovation Models to Harness New Solutions for Defence

    Innovation is a complex system with many interacting factors, which means that 'magic bullet' solutions do not exist to enhance the innovation process. RAND Europe identified eight key factors that can be used to understand innovation systems and to focus effort on being able to harness innovation for the defence industry.

    Mar 4, 2015

  • Research Brief

    Innovation models for defence

    The UK Ministry of Defence (MOD) commissioned RAND Europe to conduct a study of innovation models and make recommendations on changes the MOD could make to better harness and absorb innovation from external sources.

    Mar 4, 2015

  • Report

    Innovation Models: Enabling new defence solutions and enhanced benefits from science and technology

    The UK Ministry of Defence (MOD) commissioned RAND Europe to conduct a study of innovation models and make recommendations on changes the MOD could make to better harness and absorb innovation from external sources.

    Mar 4, 2015

  • congressional-podcast-teaser-highres

    Multimedia

    The Use of Long-Range Armed Drones: Fact v. Myth

    In this March 2015 Congressional Briefing, a panel of RAND experts discuss the effect of armed drones on global warfare, whether U.S. policy on armed drones shapes the way other nations deploy them, and the sale of armed drones to allies.

    Mar 3, 2015

  • An MQ-9 Reaper sits on a ramp in Afghanistan

    Commentary

    Armed Drone Myth 3: Global Proliferation Demands Blanket Restrictions on Sales

    More than 70 countries have acquired drones of different classes and for different purposes. However, the number of countries actually developing “armed” drones is far smaller. And smaller still is the number of those countries developing long-range armed systems.

    Feb 19, 2015

  • Illustration of idea, solution, and money

    Commentary

    Managing Technology in an Unmanageable World

    The need for purposeful and focused R&D in the U.S. has never been greater, but technology is advancing so quickly that the structures available to manage it have not kept pace. A comprehensive examination of the technological landscape is needed to help the government take a more holistic approach to investing in and regulating technologies.

    Feb 19, 2015

  • An MQ-9 Reaper sits on the flightline at Creech Air Force Base, NV

    Commentary

    Armed Drone Myth 1: They Will Transform How War Is Waged Globally

    Long-range military drones are fundamentally misunderstood. Their champions wrongly contend they are revolutionizing warfare, while critics fear their spread would greatly increase the threat that China, terrorists, and others pose.

    Feb 17, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • An exercise at the Joint Cyber Control Center

    Report

    The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Both special operations forces and cyber forces are small teams of highly skilled specialists, and both communities value skilled personnel above all else. What lessons can be drawn from a review of the commonalities, similarities, and differences between U.S. cyber forces and early U.S. special forces?

    Oct 3, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Report

    Designing Unmanned Systems with Greater Autonomy: Using a Federated, Partially Open Systems Architecture Approach

    Many current unmanned systems (UxSs) employ different communication systems and have limited autonomy, which limit information sharing with warfighters and other UxSs. This report identifies ways to address these limitations.

    Sep 17, 2014

  • Line handlers await the arrival of the Virginia class attack submarine USS Hartford

    Commentary

    How Do We Deal with a Flood of Data?

    Despite the battle-tested value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming to Navy analysts. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.

    Jun 23, 2014

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Blog

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • t-call-experts-hr

    Multimedia

    Media Call on Armed Aerial Drones and U.S. Security

    Lynn Davis, Director of RAND's Washington office and senior political scientist hosted a news media conference call to discuss armed aerial drones and U.S. security.

    May 16, 2014

  • Report

    The Effectiveness of Remotely Piloted Aircraft in a Permissive Hunter-Killer Scenario

    This report analyzes the operational effectiveness of several new concepts for employing remotely piloted aircraft in a permissive hunter-killer mission.

    May 9, 2014

  • News Release

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. Cloud strategies offer promising options.

    May 5, 2014

  • intelligence specialist monitors automatic identification systems aboard the aircraft carrier USS George H.W. Bush

    Report

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. “Cloud” strategies offer promising options.

    May 1, 2014

  • Report

    Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review

    This report summarizes a selection of the defense acquisition literature from the 1960s to the present on potential sources of prolonged acquisition cycle times and schedule growth, as well as potential opportunities for improvement.

    Apr 30, 2014